Abstract: In this content analysis research note the aim was to explore to how sustainability and especially environmental issues are conveyed into environmental items in annual reports and disclosures. As The Global Reporting Initiative (GRI) is a globally wide multistakeholder process, the enterprises using voluntarily GRI framework are considered to be aware of sustainability and environmental concerns. The findings were that although these enterprises included in an environmentally sensitive industry sector and had special capabilities to consider environmental issues there were few GRIreporting enterprises presented substantially detailed environmental items in audited financial statements. There were only slight differences between publishing years 2008 and 2009 - the beginning years of economic turmoil. The environmental issues seemed not to be considered substantial enough for financial reporting as a basis for concerning investment or voting decisions.
Abstract: As there are also graph methods of circuit analysis in
addition to algebraic methods, it is, in theory, clearly possible to
carry out an analysis of a whole switched circuit in two-phase
switching exclusively by the graph method as well. This article deals
with two methods of full-graph solving of switched circuits: by
transformation graphs and by two-graphs. It deals with the circuit
switched capacitors and the switched current, too. All methods are
presented in an equally detailed steps to be able to compare.
Abstract: This paper describes a concept of stereotype student
model in adaptive knowledge acquisition e-learning system. Defined
knowledge stereotypes are based on student's proficiency level and
on Bloom's knowledge taxonomy. The teacher module is responsible
for the whole adaptivity process: the automatic generation of
courseware elements, their dynamic selection and sorting, as well as
their adaptive presentation using templates for statements and
questions. The adaptation of courseware is realized according to
student-s knowledge stereotype.
Abstract: This paper focuses attention on specific aspects of
entrepreneurial decisions relating to investment, both in the total
fixed investments and plant & machinery (separately). Demand and
financial factors, internal and external, are considered in the
investment analysis. Finally the influence of determinants of fixed
investment and investment plans are examined in Electric Power
industry in India.
Abstract: Bringing change to the housing industry requires
multiple efforts from various angles especially to overcome any
resistances in the form of technology, human aspects, financial and
resources. The transition from conventional to sustainable approach
consumes time as it requires changes from different facets in the
industry ranging from individual, organisational to industry level. In
Malaysia, there are various efforts to bring green into the industry but
the progress is low-moderate. Will the current efforts bear larger
fruits in the near future? This study examines the perceptions of the
developers in Malaysia on the future of the green housing sector for
the next 5 years. The introduction of GBI rating system, improvement
of awareness and knowledge among the stakeholders, support from
the government and local industry and the effect of competitive
advantage would support brighter future. Meanwhile, the status quo
in rules and regulation, lack of public interest and demand,
organization disinterest, local authority enforcement and project cost
escalation would hinder a faster progress.
Abstract: In order to achieve better road utilization and traffic
efficiency, there is an urgent need for a travel information delivery
mechanism to assist the drivers in making better decisions in the
emerging intelligent transportation system applications. In this paper,
we propose a relayed multicast scheme under heterogeneous networks
for this purpose. In the proposed system, travel information consisting
of summarized traffic conditions, important events, real-time traffic
videos, and local information service contents is formed into layers
and multicasted through an integration of WiMAX infrastructure and
Vehicular Ad hoc Networks (VANET). By the support of adaptive
modulation and coding in WiMAX, the radio resources can be
optimally allocated when performing multicast so as to dynamically
adjust the number of data layers received by the users. In addition to
multicast supported by WiMAX, a knowledge propagation and
information relay scheme by VANET is designed. The experimental
results validate the feasibility and effectiveness of the proposed
scheme.
Abstract: The effect of chemical treatment in CdCl2 on the
compositional changes and defect structures of potentially useful ZnS
solar cell thin films prepared by vacuum deposition method was
studied using the complementary Rutherford backscattering (RBS)
and Thermoluminesence (TL) techniques. A series of electron and
hole traps are found in the various as deposited samples studied.
After treatment, perturbation on the intensity is noted; mobile defect
states and charge conversion and/or transfer between defect states are
found.
Abstract: In many applications, magnetic suspension systems
are required to operate over large variations in air gap. As a result,
the nonlinearities inherent in most types of suspensions have a
significant impact on performance. Specifically, it may be difficult to
design a linear controller which gives satisfactory performance,
stability, and disturbance rejection over a wide range of operating
points. in this paper an optimal controller based on discontinuous
mathematical model of the system for an electromagnetic suspension
system which is applied in magnetic trains has been designed .
Simulations show that the new controller can adapt well to the
variance of suspension mass and gap, and keep its dynamic
performance, thus it is superior to the classic controller.
Abstract: This paper discusses effects of adhesive thickness,
overlap length and material combinations on the single-lap
joints strength from the point of singular stress fields. A useful
method calculating the ratio of intensity of singular stress is
proposed using FEM for different adhesive thickness and
overlap length. It is found that the intensity of singular stress
increases with increasing adhesive thickness, and decreases
with increasing overlap length. The increment and decrement
are different depending on material combinations between
adhesive and adherent.
Abstract: This paper systematically investigates the timedependent
health outcomes for office staff during computer work
using the developed mathematical model. The model describes timedependent
health outcomes in multiple body regions associated with
computer usage. The association is explicitly presented with a doseresponse
relationship which is parametrized by body region
parameters. Using the developed model we perform extensive
investigations of the health outcomes statically and dynamically. We
compare the risk body regions and provide various severity rankings
of the discomfort rate changes with respect to computer-related
workload dynamically for the study population. Application of the
developed model reveals a wide range of findings. Such broad
spectrum of investigations in a single report literature is lacking.
Based upon the model analysis, it is discovered that the highest
average severity level of the discomfort exists in neck, shoulder, eyes,
shoulder joint/upper arm, upper back, low back and head etc. The
biggest weekly changes of discomfort rates are in eyes, neck, head,
shoulder, shoulder joint/upper arm and upper back etc. The fastest
discomfort rate is found in neck, followed by shoulder, eyes, head,
shoulder joint/upper arm and upper back etc. Most of our findings are
consistent with the literature, which demonstrates that the developed
model and results are applicable and valuable and can be utilized to
assess correlation between the amount of computer-related workload
and health risk.
Abstract: The present study is concerned with the free
convective two dimensional flow and heat transfer, within the
framework of Boussinesq approximation, in anisotropic fluid filled
porous rectangular enclosure subjected to end-to-end temperature
difference have been investigated using Lattice Boltzmann method
fornon-Darcy flow model. Effects of the moving lid direction (top,
bottom, left, and right wall moving in the negative and positive x&ydirections),
number of moving walls (one or two opposite walls), the
sliding wall velocity, and four different constant temperatures
opposite walls cases (two surfaces are being insulated and the
twoother surfaces areimposed to be at constant hot and cold
temperature)have been conducted. The results obtained are discussed
in terms of the Nusselt number, vectors, contours, and isotherms.
Abstract: Nowadays increasingly the population makes use of
Information Technology (IT). As such, in recent year the Portuguese
government increased its focus on using the IT for improving
people-s life and began to develop a set of measures to enable the
modernization of the Public Administration, and so reducing the gap
between Public Administration and citizens.Thus the Portuguese
Government launched the Simplex Program. However these
SIMPLEX eGov measures, which have been implemented over the
years, present a serious challenge: how to forecast its impact on
existing Information Systems Architecture (ISA). Thus, this research
is focus in addressing the problem of automating the evaluation of the
actual impact of implementation an eGovSimplification and
Modernization measures in the Information Systems Architecture. To
realize the evaluation we proposes a Framework, which is supported
by some key concepts as: Quality Factors, ISA modeling,
Multicriteria Approach, Polarity Profile and Quality Metrics
Abstract: The present study has been conducted to characterize
the prophenoloxidase (PPO) system of the desert locust, Schistocerca
gregaria following injection of Bacillus thuringiensis kurstaki (Bt).
The bulk of PPO system was associated with haemocytes and a little
amount was found in plasma. This system was activated by different
activators such as laminarin, lipopolysaccharide (LPS) and trypsin
suggesting that the stimulatory mechanism may involve an enzyme
cascade of one or more associated molecules. These activators did
not activate all the molecules of the cascade. Presence of
phenoloxidase activity (PO) coincides with the appearance of protein
band with molecular weight (MW) 70.154 KD (Kilo Dalton).
Abstract: Deep Brain Stimulation or DBS is the second solution
for Parkinson's Disease. Its three parameters are: frequency, pulse
width and voltage. They must be optimized to achieve successful
treatment. Nowadays it is done clinically by neurologists and there is
not certain numerical method to detect them. The aim of this research
is to introduce simulation and modeling of Parkinson's Disease
treatment as a computational procedure to select optimum voltage.
We recorded finger tremor signals of some Parkinsonian patients
under DBS treatment at constant frequency and pulse width but
variable voltages; then, we adapted a new model to fit these data. The
optimum voltages obtained by data fitting results were the same as
neurologists- commented voltages, which means modeling can be
used as an engineering method to select optimum stimulation
voltages.
Abstract: Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.
Abstract: In this paper, a necessary and sufficient coefficient are given for functions in a class of complex valued meromorphic harmonic univalent functions of the form f = h + g using Salagean operator. Furthermore, distortion theorems, extreme points, convolution condition and convex combinations for this family of meromorphic harmonic functions are obtained.
Abstract: We suggest a novel method to incorporate longterm
redundancy (LTR) in signal time domain compression
methods. The proposition is based on block-sorting and curve
simplification. The proposition is illustrated on the ECG
signal as a post-processor for the FAN method. Test
applications on the new so-obtained FAN+ method using the
MIT-BIH database show substantial improvement of the
compression ratio-distortion behavior for a higher quality
reconstructed signal.
Abstract: An on-demand routing protocol for wireless ad hoc
networks is one that searches for and attempts to discover a route to
some destination node only when a sending node originates a data
packet addressed to that node. In order to avoid the need for such a
route discovery to be performed before each data packet is sent, such
routing protocols must cache routes previously discovered. This
paper presents an analysis of the effect of intelligent caching in a non
clustered network, using on-demand routing protocols in wireless ad
hoc networks. The analysis carried out is based on the Dynamic
Source Routing protocol (DSR), which operates entirely on-demand.
DSR uses the cache in every node to save the paths that are learnt
during route discovery procedure. In this implementation, caching
these paths only at intermediate nodes and using the paths from these
caches when required is tried. This technique helps in storing more
number of routes that are learnt without erasing the entries in the
cache, to store a new route that is learnt.
The simulation results on DSR have shown that this technique
drastically increases the available memory for caching the routes
discovered without affecting the performance of the DSR routing
protocol in any way, except for a small increase in end to end delay.
Abstract: Medical image registration is the key technology in image guided radiation therapy (IGRT) systems. On the basis of the previous work on our IGRT prototype with a biorthogonal x-ray imaging system, we described a method focused on the 2D/2D rigid-body registration using multiresolution pyramid based mutual information in this paper. Three key steps were involved in the method : firstly, four 2D images were obtained including two x-ray projection images and two digital reconstructed radiographies(DRRs ) as the input for the registration ; Secondly, each pair of the corresponding x-ray image and DRR image were matched using multiresolution pyramid based mutual information under the ITK registration framework ; Thirdly, we got the final couch offset through a coordinate transformation by calculating the translations acquired from the two pairs of the images. A simulation example of a parotid gland tumor case and a clinical example of an anthropomorphic head phantom were employed in the verification tests. In addition, the influence of different CT slice thickness were tested. The simulation results showed that the positioning errors were 0.068±0.070, 0.072±0.098, 0.154±0.176mm along three axes which were lateral, longitudinal and vertical. The clinical test indicated that the positioning errors of the planned isocenter were 0.066, 0.07, 2.06mm on average with a CT slice thickness of 2.5mm. It can be concluded that our method with its verified accuracy and robustness can be effectively used in IGRT systems for patient setup.
Abstract: The development of information and communication
technology, the increased use of the internet, as well as the effects of
the recession within the last years, have lead to the increased use of
cloud computing based solutions, also called on-demand solutions.
These solutions offer a large number of benefits to organizations as
well as challenges and risks, mainly determined by data visualization
in different geographic locations on the internet. As far as the specific
risks of cloud environment are concerned, data security is still
considered a peak barrier in adopting cloud computing. The present
study offers an approach upon ensuring the security of cloud data,
oriented towards the whole data life cycle. The final part of the study
focuses on the assessment of data security in the cloud, this
representing the bases in determining the potential losses and the
premise for subsequent improvements and continuous learning.